SolarWinds ARM Vulnerable to Directory Traversal Remote Code Execution
CVE-2024-23479

9.6CRITICAL

Key Information:

Vendor
Solarwinds
Vendor
CVE Published:
15 February 2024

Summary

The vulnerability in SolarWinds Access Rights Manager (ARM) relates to a Directory Traversal flaw that enables an unauthenticated attacker to execute remote code. By manipulating file paths or input parameters, an attacker may gain unauthorized access to sensitive files and execute arbitrary commands on the server, posing a significant security risk. Organizations using affected versions of SolarWinds ARM should apply patches and review their security measures to mitigate potential exploitation.

Affected Version(s)

Access Rights Manager previous versions <= 2023.2.2

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anonymous working with Trend Micro Zero Day Initiative
.